
Efficient Method for Storing Health Record in Cloud Using Integrity Auditing and Data Sharing
Author(s) -
K. Abirami,
K P Ajaye,
Roshan B L Amrrish,
Nishanthan A Arun
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1916/1/012191
Subject(s) - cloud computing , computer science , upload , computer security , data sharing , cloud storage , key (lock) , database , audit , encryption , world wide web , operating system , medicine , alternative medicine , pathology , management , economics
Identity based cloud storage authorization is proposed in this paper to provide protection of cloud data. Many sensitive information is stored in the cloud, and it must be kept safe from unauthorized access. By hiding the sensitive information’s, privacy for an individual or organization is provided. The data in the cloud are secured by hiding the sensitive information. In the proposed system when the user and data analyzer sign-in they will receive the verification mail to assure as a valid user or data analyzer. The verification key for the user and the data analyzer is generated by the Private Key Generator (PKG). The user and the data analyzer enter the cloud using the verification key to upload and retrieve data from the cloud. Until uploading data to the cloud, the user encrypts the data, concealing confidential details. The Third Party Auditor is in charge of the cloud auditing process (TPA). This scheme allows data files stored in the cloud to be shared and used by data analyzers under the condition that confidential information is hidden, allowing the auditing system to operate more efficiently.